Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Towards a hierarchy of hotel guests’ in-room needs
Available to Purchase
International Journal of Contemporary Hospitality Management (2019) 31 (12): 4401–4418.
Published: 21 August 2019
... needs using inductive thematic coding and content analysis. Findings The psychological and physical in-room needs of individual hotel guests are identified; safety, security and control emerge as paramount. Practical suggestions to complement, expand and enrich guests’ in-room experiences...
Journal Articles
Toward an integrated model of adoption of mobile phones for purchasing ancillary services in air travel
Available to Purchase
International Journal of Contemporary Hospitality Management (2014) 26 (2): 246–271.
Published: 04 February 2014
... of mobile phones to purchase ancillary air travel services. Design/methodology/approach – A comprehensive structural model was developed based on the Technology Acceptance Model and augmented with constructs like trust, privacy, security, innovativeness, and personalization. The model was validated...
Journal Articles
Issues of security in hotels
Available to Purchase
International Journal of Contemporary Hospitality Management (2003) 15 (1): 14–19.
Published: 01 February 2003
...Karen Groenenboom; Peter Jones This article reports the findings of in‐depth interviews with security managers from some of London’s top hotels. What emerges is a range of different approaches to executing security policy. Key issues are identified in relation to the balance between providing...
Journal Articles
Security management and crime in hotels
Available to Purchase
International Journal of Contemporary Hospitality Management (2002) 14 (2): 58–64.
Published: 01 April 2002
...Martin Gill; Chris Moon; Polly Seaman; Vicky Turbin This article presents the results of an exploratory investigation into the role of the security manager in the UK hotel industry, an area of management that has been under‐researched. In addition, this paper provides qualitative evidence about...
Journal Articles
Hotel Security: The Needs of the Mature Age Market
Available to Purchase
International Journal of Contemporary Hospitality Management (1994) 6 (5): 14–19.
Published: 01 October 1994
...Gerald Shortt; Hein Ruys The mature age market segment in Australia have increased leisure time and disposable income. Many hotels are trying to increase occupancies,particularly in low season, by attempting to attract this market segment. Reports on a survey of the security needs and perceptions...
